메뉴 건너뛰기




Volumn 2467, Issue , 2002, Pages 63-73

Towards a survivable security architecture for ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AD HOC NETWORKS; MOBILE AD HOC NETWORKS; NETWORK ARCHITECTURE;

EID: 84958752287     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45807-7_9     Document Type: Conference Paper
Times cited : (18)

References (17)
  • 1
    • 84958823723 scopus 로고    scopus 로고
    • Key-argeement in ad-hoc networks
    • To appear
    • N. Asokan and Philip Ginzboorg. Key-argeement in ad-hoc networks. Elsevier Preprint, 2000. To appear.
    • (2000) Elsevier Preprint
    • Asokan, N.1    Ginzboorg, P.2
  • 3
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • of, LNCS, Perugia, Italy, May, Springer
    • Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology – EUROCRYPT’94, volume 950 of LNCS, pages 275–286, Perugia, Italy, May 1994. Springer.
    • (1994) Advances in Cryptology – EUROCRYPT’94 , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 15
    • 0040892182 scopus 로고    scopus 로고
    • TETRA security – the fundament of a high performance system
    • Gert Roelofsen
    • Gert Roelofsen. TETRA security – the fundament of a high performance system. In Proc. TETRA Conference 1997, 1997.
    • (1997) Proc. TETRA Conference 1997
  • 16
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November-December
    • Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6), November-December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.